what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2000-04-12 to 2000-04-13

ssh-2.1.0.tar.gz
Posted Apr 12, 2000
Site ssh.fi

SSH (Secure Shell) is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another, providing strong authentication and a secure communications over insecure channels.

Changes: sftp2 rewritten, bug fixes.
tags | remote, shell, encryption
SHA-256 | 9d7c82113e8f96a67afb1ce99ceb348d95c8445a47a1a65acbcf84cb971bd5ee
bmap-1.0.16.tar.gz
Posted Apr 12, 2000
Authored by Daniel Ridge

The Linux kernel includes a powerful, filesystem independant mechanism for mapping logical files onto the sectors they occupy on disk, which can be subverted (with bmap and friends) to perform a variety of functions interesting to the computer forensics community and the computer security community.

tags | kernel
systems | linux
SHA-256 | 45ffa75f71b46ae1e420cd0bc8d67620f9cdbc30d96a650decbc15647de77f0d
DeCRYPTO.zip
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin pin can be decrypted from the .pdb file - Windows 9X demonstration program.

tags | exploit
systems | windows
SHA-256 | 1c39bef81b495add319b132a0b439b84f5ac8247873637ae83f4dbc4f2ba012f
cc-pinextract.txt
Posted Apr 12, 2000
Authored by Kingpin | Site l0pht.com

CRYPTOCard's CRYPTOAdmin software is a challenge/response user authentication administration system. The PT-1 token, which runs on a PalmOS device, generates the one-time-password response. A PalmOS .PDB file is created for each user and loaded onto their Palm device. By gaining access to the .PDB file, the legitimate user's PIN can be determined through a series of DES decrypts-and-compares. Using the demonstration tool, the PIN can be determined in under 5 minutes on a Pentium III 450MHz.

tags | exploit
systems | palmos
SHA-256 | e6389d8ca2def0371d397ac69b9cc79c004fcfe85414c5e79412c03aaadabb09
hnsmarc.pl
Posted Apr 12, 2000
Authored by CG1H3R0

hnsmarc.pl grabs current news from www.net-security.org, rewritten using the LWP-Package instead of lynx for increased portability and less resource usage.

tags | web
SHA-256 | 7b1c19eca6bd1d3610ccded97b442d9e54dac4c5c9e159b8ec75620fb9509a8b
sourcegrab.pl
Posted Apr 12, 2000
Authored by x00x00

Exploit for Microsoft Index Server 2.0 hithighlight exploit (as described in ms00-006) which allows you to view any file in the wwwroot directory and down.

tags | exploit
SHA-256 | e7181e3f88d7f2f6f593e36b2e6ccf4c1078d50114bac13f45e6f4fa709a3e04
ms00-023
Posted Apr 12, 2000

Microsoft Security Bulletin (MS00-023) - Microsoft has released a patch for a security vulnerability in Microsoft Internet Information Server. The vulnerability allows a malicious user to slow a web server's response or prevent it from providing service altogether. Microsoft FAQ on this issue available here.

tags | web
SHA-256 | da9189ad265b4177fbec8d84efe20feeeadb3bcd3ea5e77a1703a1bb0ef20e8b
RegistryAnalyzer.zip
Posted Apr 12, 2000
Authored by TheWiz

Registry Analyzer is a program that can analyze a Windows 95/98 registry file (user.dat,system.dat). Use this program to read the registry database of another computer registry file.

tags | registry
systems | windows
SHA-256 | 15edd2e9858d837775512a85dbfaeb4dd0e39836e46c25a4eedd9e6951fa475d
tcpdfilter_2.0.tar.gz
Posted Apr 12, 2000
Authored by Trenton D. Adams

TCPDump Filter is a program that filters hex output from tcpdump, and converts it to ASCII and displays it on the screen.

Changes: New -x option to include hex output instead of outputting it by default, -d option to decode IP packets, now includes a usage message.
tags | tool, sniffer
SHA-256 | 4dcee9ef07ede6bfe32a909c9b4a3b879696ff06ca05e2e9a443b4a6e98716ca
d0s.pl
Posted Apr 12, 2000
Authored by r00tabega, ragnarox | Site r00tabega.com

DoS.pl uses Net::RawIP to launch a syn flood attack.

tags | denial of service
SHA-256 | 32ae0c00c03fd1e282fef426d088787651a77b6b9c1400e9ef48c2c496d3e497
bastion11.txt
Posted Apr 12, 2000
Authored by Kevin Steves | Site people.hp.se

Building a Bastion Host Using HP-UX 11 - Covers configuring HP-UX 10 and 11 to be a secure host, useful for firewall gateways, web servers, ftp servers, dns servers, mail hubs, and more.

tags | paper, web
systems | unix, hpux
SHA-256 | d1b8db73a010afb5da4be15559a94e2c098a450abb5a26cce22234cd6db501d7
sentinel-0.5.tar.gz
Posted Apr 12, 2000
Authored by Bind | Site packetfactory.net

The Sentinel project is designed to be a portable, accurate implementation of all publicly known promiscuous detection techniques. Sentinel currently supports 3 methods of remote promiscuous detection: The DNS test, Etherping test, and ARP test. Support for the ICMP Ping Latency test is under development.

Changes: Now works correctly under linux.
tags | tool, remote, intrusion detection
systems | unix
SHA-256 | 6d5ba58d987fc714aa42799e13604eb61ef54d01b82002d7c9878e095880635b
Fortres4-analysis.txt
Posted Apr 12, 2000
Authored by Frost Byte

Fortres 4.0 security software for Windows has an easily decrypted password. Qbasic source includeed to crack the simple encryption.

tags | exploit
systems | windows
SHA-256 | e2d86ed239ba13f4e4fead5544d33b1b698b5c7354b27dd04f8ea77839827da5
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close